Главная
Study mode:
on
1
Introduction
2
Bluetooth
3
Bluetooth Pairing
4
First Attack
5
What is an Eelliptic Curve
6
Group Elements
7
Inverse Definition
8
Point Addition
9
Point Doubling
10
Identity Element
11
Eelliptic Curve DiffieHellman
12
Invalid Curve Attack
13
Assumptions
14
Pairing Procedure
15
Key Exchange
16
Authentication Phase
17
Attack Phase
18
SemiPassive
19
Key derivation
20
Verification
21
Frequency Hopping
22
Over Air Pocket Manipulation
23
Design Flaws
24
Mitigation
25
Disclosure
26
Early Secure Connections
27
Secure Pairing
Description:
Explore the vulnerabilities in Bluetooth pairing through this conference talk that delves into the Fixed Coordinate Invalid Curve Attack. Learn about elliptic curve cryptography fundamentals, including group elements, point operations, and the Diffie-Hellman key exchange. Understand the intricacies of the Bluetooth pairing procedure, authentication phase, and how the attack exploits design flaws. Discover the attack methodology, including key derivation, verification, and over-air packet manipulation. Examine mitigation strategies and the disclosure process, as well as improvements in early secure connections and secure pairing protocols.

Breaking the Bluetooth Pairing - Fixed Coordinate Invalid Curve Attack

TheIACR
Add to list
0:00 / 0:00